GB2439568A - Transient protection key derivation in a computing device - Google Patents

Transient protection key derivation in a computing device Download PDF

Info

Publication number
GB2439568A
GB2439568A GB0611351A GB0611351A GB2439568A GB 2439568 A GB2439568 A GB 2439568A GB 0611351 A GB0611351 A GB 0611351A GB 0611351 A GB0611351 A GB 0611351A GB 2439568 A GB2439568 A GB 2439568A
Authority
GB
United Kingdom
Prior art keywords
authentication
user
cpk
cis
methods
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Withdrawn
Application number
GB0611351A
Other versions
GB0611351D0 (en
Inventor
Andrew Harker
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Symbian Software Ltd
Original Assignee
Symbian Software Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Symbian Software Ltd filed Critical Symbian Software Ltd
Priority to GB0611351A priority Critical patent/GB2439568A/en
Publication of GB0611351D0 publication Critical patent/GB0611351D0/en
Priority to US12/303,282 priority patent/US20090327722A1/en
Priority to EP07733115A priority patent/EP2030144A1/en
Priority to PCT/GB2007/002104 priority patent/WO2007141532A1/en
Publication of GB2439568A publication Critical patent/GB2439568A/en
Withdrawn legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F12/00Accessing, addressing or allocating within memory systems or architectures
    • G06F12/14Protection against unauthorised use of memory or access to memory
    • G06F12/1408Protection against unauthorised use of memory or access to memory by using cryptography
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Theoretical Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • Software Systems (AREA)
  • Storage Device Security (AREA)

Abstract

A computing device is arranged to use any possible permutation of methods available to it to authenticate a user, without needing to persistently store any unencrypted data that can be used in authentication, such data only ever being held in transient memory. A user of the device is provided with their own unique common protection key (CPK) which can be used to guard or encrypt sensitive data and functionality. Each of the authentication methods is guaranteed to return a unique consistent identification sequence (CIS) each time it is employed by any specific user. When a user registers on the device, the CIS from each authentication method is used to generate a key which in turn is used to encrypt the CPK ; this E(CPK) is then stored in a table indexed by user and authentication method. Neither the CPK nor any CIS are ever kept on the device except in transient memory. When authentication is sought, the CIS for each requested method is obtained and is used to regenerate the key that can be used to decrypt the E(CPK). All the CPKs thus decrypted must match for authentication to be granted.

Description

<p>1 2439568 Transient Protection Key Derivation in a Computing Device
This invention relates to an improved method for operating a computing device, and in particular to an improved method for providing user authentication on a computing device.</p>
<p>In the context of the present invention, authentication refers to the process by which the identity claimed by an individual is verified. It is frequently used in conjunction with computing devices to enable a user of the device to gain access to specific data and services which are only authorised for use by a particular individual. Such devices include, without being limited to, desktop and laptop computers, Personal Digital Assistants (PDAs), mobile telephones, smartphones, set-top boxes and games consoles, together with converged devices incorporating the functionality of one or more of the classes of device referred to above, as well as many other industrial and domestic electronic appliances such as ATM machines, digital cameras and digital music players.</p>
<p>Simple password protection is perhaps the most common means of authentication on such devices; an individual confirms their identity by typing in a password, which is then passed through a one-way hash with the result being compared to a previous version of the hashed password stored on the device. If there is a match, access is permitted; if there is a discrepancy, access is refused.</p>
<p>However, it is known that this authentication mechanism is not sufficient to protect any sensitive information that may be stored on the device. This may include commercially or personally valuable data, such as banking access keys and private addresses. The reason for this is that protecting access to the device by means of a password while leaving the data store as plain text data does not adequately protect the information if unauthenticated access to the raw file storage is possible without having to enter the password.</p>
<p>One example of such an attack is via software such as viruses or spyware which can infect the device, gain access to information, and either destroy it or steal it.</p>
<p>Another example is where someone with physical access to the device accesses the storage hardware on the device directly; the simplest way of doing this would be to physically remove the memory storage from one device and then insert it in a different device.</p>
<p>To protect against such attacks, owners of computing devices commonly employ encryption technology to further protect their most sensitive data, with full access only being possible on provision of a specific decryption key. This is far more secure than simply password protecting use of a device, because even if the data is compromised by bypassing normal access methods, the fact that it is encrypted renders it unintelligible to anyone who does not possess the keys that provide the means of decrypting it.</p>
<p>It is logically impossible for those keys themselves to be stored in encrypted form; but at the same time, storing them on the device unencrypted (as plain text) leaves both them and any encrypted data vulnerable to precisely the same type of attack that the encryption was designed to avoid.</p>
<p>This apparent paradox can be solved by means of a transient key which is not permanently stored on the device itself.</p>
<p>One common implementation of a transient key protocol is provided in the popular PGP (Pretty Good Privacy) software originally designed by Phil Zimmermann. Keys are stored in an encrypted private store called a keyring, which is protected by a passphrase that the user has to remember. This passphrase is never stored on the device itself; when entered by the user, it enables the derivation of a transient protection key, which is never kept in persistent storage but only in volatile memory. This transient key is used to symmetrically encrypt and decrypt the keyring.</p>
<p>According to http://en.wikipedia.org/wiki/Authentication: "The methods by which a human can authenticate themselves are generally classified into three cases: * Something the user is (e.g., fingerprint or retinal pattern, DNA sequence (there are assorted definitions of what is sufficient), voice pattern (again several definitions), signature recognition or other biometric identifier) * Something the user has (e.g., ID card, security token, software token or cell phone) * Something the user knows (e.g., a password, a pass phrase or a personal identification number (PIN)) Sometimes a combination of methods is used, e.g., a bank card and a PIN, in which case the term two-factor authentication' is used." Methods based on authenticating who a user is have historically been computationally expensive in terms of both time and equipment where the personal data used is biometrically hard' (such as fingerprint or retinal scan or DNA) or else subject to change over time and susceptible to forgery where the data used is soft' (such as photographs and signatures, which are gradually being phased out as authentication factors on items such as passports and credit cards).</p>
<p>Methods based on authenticating something a user has are inherently limited to a small number of items and are also susceptible to theft and loss; people find it practicably impossible to carry dozens of different items with them and to rely on one common item introduces a highly susceptible single point of failure or attack.</p>
<p>Additionally, both these methods are difficult to use in the remote authentication situations which are commonly used by computing devices in internet and telephone communication.</p>
<p>Consequently, the prior art as outlined above tends to be limited to authentication based on something that the user knows. Knowledge is quick and inexpensive to verify, it can be used remotely, and cannot easily be physically lost or stolen.</p>
<p>However, this type of authentication method can only be used reliably if the knowledge can be guaranteed to have been kept secret. When this essential secrecy has been compromised, the authentication is worthless. There are now many methods in use by malware and criminal gangs that make use of security vulnerabilities in systems that rely on secret knowledge. Among the most notorious of these are: * internet phishing' attacks, which seek to trick users into divulging secret passwords * spyware which infects computing devices and records keystrokes used in authentication * false front and lebanese loop' attacks on cashpoints machines by which criminals trick users into divulging their PINS while simultaneously leaving their access cards in ATMs.</p>
<p>As well as these inadvertent disclosures of secret information, there are increasing instances and opportunities for deliberate leakage of secret access information, where the authorised user of a resource colludes in its misappropriation by a third party. Divulging access codes which enable piracy of computer software packages and digitally protected media content is an example of this type of leakage.</p>
<p>But at the same time as knowledge-based authentication has come under increasing attack, advances in technology have begun to bring down the expense involved in authentication based on something the user is. Biometric verifications of identity are now practical propositions on many devices; for example, a mobile (*uj phone with fingerprint recognition, the Pantech GlI00, was launched in 2004 (see http://www.mobilemag.com/content/I 00/3401C3462/).</p>
<p>It is now increasingly practical in many situations to employ multi-factor authentications schemes, which overcome the limitations of individual authentication properties by using them in combination.</p>
<p>Ideally, the choice of which authentication method or methods to use in any circumstance should be a tradeoff based on the perceived damage arising from a security breach in any particular case, the perceived costs of the authentication, and the perceived threats. For example, if a person is eating lunch at an establishment where they are well-known, it would be considered disproportionate, unnecessary and excessively expensive for the manager to insist on the taking of fingerprints and retinal scans for a full biometric verification of identity when paying for relatively inexpensive food and drink with a bank debit card. However, such precautions may not be considered to be out of place if the person took the same bank debit card to a branch of the person's bank, and requested the entire balance of the account to be paid out in cash.</p>
<p>Additionally, the appropriate choices for any circumstance cannot be regarded as fixed. As social trends and the available technology change, the limits of acceptability and practicality are liable to change also. Circumstances also alter security calculations, both socially and personally; for example, the perception of a high danger of terrorist attacks may make it possible to enforce stronger and costlier methods of authentication for passengers on transport networks.</p>
<p>According to a first aspect of the present invention there is provided a method of operating a computing device comprising using one or a combination of methods chosen from amongst a plurality of methods for authenticating a user of the device by means of: a. providing the said user of the device with a unique CPK which can be used to guard or encrypt sensitive data and functionality; and b. providing for each authentication method a means of returning a unique CIS each time it is employed by the said user; and c. for each authentication method available to the device i. passing the said CIS through replicable mathematical mechanisms which generate a CISK unique to that CIS but from which the CIS cannot be derived; and ii. employing the said CISK to symmetrically encrypt the CPK; and iii. keeping the said encrypted version of the CPK in some type of persistent storage available to the device in such a way that is can be retrieved by providing the authentication method and the user; and wherein, when a user of the device requests authentication by means of one or a combination of available authentication methods a. for each authentication method required i. that method is invoked to obtain its CIS for the said user; and ii. the said CIS is passed through the mathematical mechanisms described above to generate a CISK; and iii. the encrypted CPK for the said method and the said user is retrieved from the persistent storage where it is kept; and] iv. the actual CPK is decrypted from the encrypted CPK means of the CISK; and b. authentication is provided by releasing the identify of the user and their CPK provided that either i. the CPKs returned by each authentication method required are identical; or ii. in the case where only a single authentication method is required, that it can successfully be used to decrypt a specific item of data stored on the device.</p>
<p>According to a second aspect of the present invention there is provided a computing device arranged to operate in accordance with a method of the first aspect.</p>
<p>According to a third aspect of the present invention there is provided an operating system for causing a computing device to operate in accordance with a method of the first aspect.</p>
<p>Embodiments of the present invention will now be described, by way of further example only, with reference to the accompanying drawings, wherein:-Figure 1 shows an authentication method according to the present invention; Figure 2 shows a registration process for a method of the present invention; and Figure 3 shows an embodiment of the present invention.</p>
<p>A perception behind this invention is that there is a need to be able to choose dynamically the most appropriate authentication method or methods from a number of possible authentication methods, depending on the circumstances under which authentication is requested and the methods that are practical at any point in time.</p>
<p>Furthermore, to protect against plaintext attacks on the filesystem of a device, the invention also enables the type of transient key protection described above to be independently available to each of the authentication methods.</p>
<p>While modern computing devices, especially those with communications capabilities such as smart phones, are increasingly able to make use of a wide range of authentication methods, any single one or combination of which may be used or required at any time, the known devices do not allow for how this type of dynamic selection of one from amongst a number of methods employing transient key protection might be made. The existing devices, and the methods which they employ, incorporate fixed authentication techniques and cannot readily be adapted to dynamically change from one method to another.</p>
<p>Furthermore, the present invention also envisages allowing the addition of extra authentication methods as technology develops and the calculus of risks and costs alters. Adding authentication methods on a device implies it must be capable of storing multiple additional sets of data relating to their use; and each one of these needs to be stored in such a way that they are not vulnerable to plain text attack but are nevertheless available for use in the verification process prior to any authentication taking place.</p>
<p>This invention discloses, therefore, a means by which a computing device is able to safely store multiple encrypted keys for multiple possible authentication methods, which can be chosen dynamically on demand, and which allows for the dynamic addition of extra methods.</p>
<p>Furthermore, this invention can easily be adapted to be used by existing applications that currently make use of fixed authentication methods (such as PGP). It provides such applications, and computing devices which implement it, with: * the ability to use a dynamic number of available authentication methods which may increase or decrease over time -additional methods can be added or removed in response to changes in their practicality, reliability, availability and acceptability; * the ability to dynamically choose which methods are used to authenticate any particular operation -this may mean one method, one of many methods, or a combination of a few or several methods, with the decision being influenced by either the calling application or even the user if they are given an opportunity to express a preference.</p>
<p>A feature of this invention is the employment of an entity on the computing device that acts as a local Authentication Seiver (AS), which enables any of the various authentication methods to return a Consistent Identification Sequence (CIS) for any given user. If, for example, a fingerprint method returns a sequence of data octets after analysing a fingerprint, then the local authentication server guarantees that the sequence returned will be the same each time the same user authenticates with the same finger.</p>
<p>It is stressed that the requirement for consistency does not mean results obtained from an authentication method cannot be variable. However, before a method that produces variable results can be used for authentication, a period of training will generally be needed in order to ensure that it can reliably return a CIS. The training process preferably establishes the typical parameters which enable the method to be considered as reliable. In the case of the fingerprint method described above, the absence of unexplained points of dissimilarity together with a certain number of points of similarity would trigger the return of the same CIS irrespective of what those points of similarity might be. Equally, the use of a voiceprint would preferably need to be flexible enough to identify the voice of a specific individual consistently and reliably under a variety of circumstances. The precise nature of these training processes will vary from one authentication method to another, and are considered to be outside the scope of this invention.</p>
<p>Given the availability of an AS that returns a consistent CIS for each authentication method, a proposed scheme according to the present invention might work as follows for each user who registers to use the computing device: 1. A Common Protection Key (CPK) is generated for each user at the time they register. This key is sourced from a random number generator, and is only ever stored transiently in Random Access Memory (RAM). It is important to note that the CPK is never kept in any form of persistent storage.</p>
<p>2. As described above, each authentication method will return a different Consistent Identification Sequence which is then successively passed through (a) a one-way hash or other mathematical function which generates a number unique to the CIS but from which the CIS cannot be derived; and then through (b) a key generation function to yield a C/S Key (CISK).</p>
<p>3. The CISK is then used to encrypt the CPK, the results of which can be safely written to the file system.</p>
<p>4. Steps 2 and 3 are then repeated for each authentication method the user requires; there is therefore a separately encrypted version of the same CPK for each available authentication method.</p>
<p>Figure 1 illustrates this process with two authentication mechanisms, either of which can grant access, in this case to an encrypted keyring (RNG). Note that in this embodiment the process of translating a CIS into a CISK is implicitly performed by the encryption function.</p>
<p>Figure 2 shows the registration processes sequentially as a flowchart.</p>
<p>The result of such processing can be stored on the computing device in tabular form, as shown below. In this table, there are three notional users (UserO, Userl and User2) and three possible authentication methods (ModeA, ModeB and ModeC). For each combination of user and authentication method, the table holds the CPK as encrypted by the CISK, as shown in the following table.</p>
<p>OIO)CISKAO k)CISK50 óo)CISKco E(CPK1)CISKA1 E(cPK1)CISK81 E(cpK1)cIsK1 E(cPK2)cIsKA2 E(cPK2)cIsK82 E(cpK2)cIsK2 Key cPKn Protection Key for User n CPKmn Transient Key from Mode n for User n E(Data)k Data Encrypted with Key k Note that the structure of a table such as this is by no means fixed; for example, columns corresponding to new authentication methods and rows corresponding to new users can be added as required.</p>
<p>The table is used as follows: 1. A client application requests authentication for some reason. This request may contain criteria which specifies an AND or OR combination of the available methods e.g. (fingerprint AND PIN) or (fingerprint OR voiceprint).</p>
<p>2. The authentication infrastructure invokes the relevant authentication methods for the user of the device. Each method used returns a CIS which is processed into its CISK form.</p>
<p>3. For each method, the CISK can be used to decrypt the CPK from the entry in the table which corresponds to the user and authentication mode in use, E(CPKn)ClSKrnn 4. When multiple authentication methods are used, the CPKs decrypted from each entry in the table for each method should be identical; if not, the authentication has failed. The authentication infrastructure will check this for any AND criteria specified by the client.</p>
<p>5. Where only a single authentication method is in use, the validity of the CPK it gives can only be determined by attempting to use it; typically, the authentication infrastructure will maintain a small data item which includes an internal consistency check for this purpose.</p>
<p>6. Once the authentication infrastructure has confirmed the validity of the CPK, it releases the identity of the user, and the user's CPK to the client.</p>
<p>7. The client can then employ the CPK to encrypt or decrypt information pertinent to that user.</p>
<p>Figure 3 shows these processes sequentially as a flowchart.</p>
<p>Note that at no time is it necessary to store the CPK or the CISK other than transiently in RAM; avoiding persistent storage of these items is a requirement on each client.</p>
<p>As an optimisation of the above procedure, a one-way hash of each CISK can be generated during the registration process, and stored in the table as a tuple together with the CPK as encrypted by that CISK. When this optimisation is implemented, the resulting table (shown below) is used in broadly the same way as the first table shown above, except that each CISK returned by each authentication mechanism is subjected to the same hash, and matched with the hashed CISK stored in the table. This check avoids the need to decrypt something to check that the CISK is valid.</p>
<p>Such a table with the optimised method may look as follows: 1T1li r.ts u s H(CISKA) E(CPKQ)CISKAQ H(CISKB0) E(CPK0)CISK80 H(CISKC0) E(cPK0)cIsK0 * H(CISKA1) E(cPKl)cIsKAl H(CISKB1) E(CPK1)CISKB1 H(CISKC1) E(CPK1)CISKc1 -H(CISKAQ) E(cPK2)cIsK H(CISKB2) E(CPK2)CISK82 H(CISKC2) E(CPK2)CISKc2 Key CPKn Protection Key for User n CPKmn Transient Key from Mode n for User n H(data) The Hash of some data E(Data)k Data Encrypted with Key k Enhancements to the above processes may be implemented for untrusted clients.</p>
<p>It is conceivable that a malicious client may obtain the CPK and then publish it, thus leaving protected data open to attacks which only need to defeat the file system protection on the device.</p>
<p>In environments where some unique and unspoofable identifier is available for clients, it is possible to take an additional step and generate a further key by processing both the CPK and this identifier; for example, by generating a password by an XOR of their hashes, which can be written formulaically as PKCS#5 (H (CPK) H (Clientldentifier)). The result is again a Common Protection Key unique to the client in question rather than shared between trusted clients.</p>
<p>Deliberately publishing this key is of little or no benefit since nobody else is using it. The limitation here is that only this specific client can decrypt data it encrypted.</p>
<p>No protected data can be shared between clients without the clients making explicit provision for export and import.</p>
<p>To add authentication methods is relatively straightforward. Since the invention stores all data in a standard table, it can be manipulated by conventional database functions and procedures. Adding extra columns is therefore a straightforward operation to those skilled in the art.</p>
<p>As well as the three basic methods of authentication listed above (based on who you are, what you have, and what you know) this process is straightforward to use with other methods, including but not restricted to methods analogous to the following: * location-based authentication, such as only allowing a particular atm, charge, or credit card to be used at a specific merchant or at a specific bank branch, or only allowing root access from specific terminals * time-based authentication, such as only allowing access from certain accounts during normal working hours * size-based authorization, such as only allowing a specific transaction to be for a specific exact amount * pre-authorized transactions, such as where a company uploads all of the check numbers and amounts written for each check to their bank, and the bank would then reject any check not of those numbers and amounts as fraudulent.</p>
<p>(from http://en.wikipedia.org/wiki/Authentication) Combining these methods with others leads to some innovative permutations not possible without this invention; for example, a computing device equipped for electronic commerce and banking could dynamically impose a far more stringent set of authorization methods for high-value transactions than for low-value ones; or a different set of authorization methods could be applied for a location-aware device when it is used in an unfamilar location, to ensure that it had not been stolen.</p>
<p>The present invention can be used with existing applications. One of the most widely used applications, as mentioned earlier, is PGP. With this invention, any authentication method or combination of methods could be used instead of the current sole method of passphrase entry to unlock the private key rings. By returning a single value to PGP regardless of the authentication mechanism employed, the application need have no knowledge of the actual mechanisms used.</p>
<p>Similarly, clients of such an authentication service benefit by not simply just determining the identity of the current user; they are also provided with a per-user CPK which can be immediately used to encrypt/decrypt information specifically for that user.</p>
<p>This invention removes the need for any client to manage and protect any of its own per-user keys while continuing to keep the critical information transient at all times. Essentially it relieves the clients of any key management issues when protecting information specific to a given user, whether privacy or security related.</p>
<p>* For example, a user's client-side banking certificate key can now be itself protected using one or more biometric authentication methods supported on the device.</p>
<p>* Applications can, independently of any particular method, authenticate the user and make use of whatever encryption and decryption methods are necessary to protect and access the user's data (such as a personal address book).</p>
<p>It can be realized from the above description that many advantages can accrue through the use of the present invention. This invention is applicable to any device with controlling software that needs to support multiple authentication methods. It enables: * dynamic selecting of different methods of authentication * dynamic selection of different combinations of methods of authentication * addition or removal of additional methods of authentication on demand * support for multiple users with different methods of authentication and different private data * safe permanent storage of encrypted private keys * no permanent storage of any unencrypted keys * backward compatibility with existing applications Although the present invention has been described with reference to particular embodiments, it will be appreciated that modifications may be effected whilst remaining within the scope of the present invention as defined by the appended claims.</p>

Claims (1)

  1. <p>Claims: 1. A method of operating a computing device comprising using
    one or a combination of methods chosen from amongst a plurality of methods for authenticating a user of the device by means of: a. providing the said user of the device with a unique CPK which can be used to guard or encrypt sensitive data and functionality; and b. providing for each authentication method a means of returning a unique CIS each time it is employed by the said user; and c. for each authentication method available to the device i) passing the said CIS through replicable mathematical mechanisms which generate a CISK unique to that CIS but from which the CIS cannot be derived; and ii) employing the said CISK to symmetrically encrypt the CPK; and iii) keeping the said encrypted version of the CPK in some type of persistent storage available to the device in such a way that is can be retrieved by providing the authentication method and the user; and wherein, when a user of the device requests authentication by means of one or a combination of available authentication methods d. for each authentication method required i) that method is invoked to obtain its CIS for the said user; and ii) the said CIS is passed through the mathematical mechanisms described above to generate a CISK; and iii) the encrypted CPK for the said method and the said user is retrieved from the persistent storage where it is kept; and iv) the actual CPK is decrypted from the encrypted CPK means of the CISK; and e. authentication is provided by releasing the identify of the user and their CPK provided that either i. the CPK5 returned by each authentication method required are identical; or ii. in the case where only a single authentication method is required, that it can successfully be used to decrypt a specific item of data stored on the device.</p>
    <p>2. A method according to claim I wherein authentication is requested by a client and is provided by an authentication server component.</p>
    <p>3. A method according to claim I or 2 wherein CPK and CIS and CISK data is only held transiently in the memory of the device and is never stored persistently.</p>
    <p>4. A method according to any one of claims I to 3 wherein the CPK is rendered unique by deriving it from a random number generator.</p>
    <p>5. A method according to any one of the preceding claims wherein the device supports authentication for multiple users each of which has their own unique CPK.</p>
    <p>6. A method according to any one of the preceding claims wherein combinations of authentication methods can be dynamically chosen by the user or operating or application software of the device.</p>
    <p>7. A method according to any one of the preceding claims wherein the choice of authentication methods is varied depending on the location of the device.</p>
    <p>8. A method according to any one of the preceding claims wherein the choice of authentication methods is automatically varied depending on the location of the device.</p>
    <p>9. A method according to any one of the preceding claims wherein authentication is requested pursuant to a financial transaction and wherein the choice of authentication methods is automatically varied depending on the size of the transaction.</p>
    <p>10. A method according to any one of the preceding claims wherein the encrypted version of the CPK is kept in persistent storage in tabular form where the rows and columns represent the corresponding authentication method and user.</p>
    <p>11. A method according to any one of the preceding claims wherein either authentication methods or users or both can be dynamically added or removed.</p>
    <p>12. A method according to any one of the preceding claims wherein the mathematical mechanisms used to generate the CISK can be replaced.</p>
    <p>13. A method according to any one of the preceding claims wherein authentication methods are trained for each user to enable them to return a CIS.</p>
    <p>14. A method according to any one of the preceding claims wherein a one-way hash is generated each time a CISK is generated, and wherein each persistently stored CISK, stored as a tuple together with the said hash, and wherein authentication is dependent on the hashes of the CISKs generated by each authentication method and user matching a hashes stored for that authentication method and user.</p>
    <p>15. A method according to any one of the preceding claims by which the CPK is further mathematically modified by means of the unique identifier relating to a specific client.</p>
    <p>16. A computing device arranged to operate in accordance with a method as claimed in any one of claims I to 15.</p>
    <p>17. An operating system for causing a computing device to operate in accordance with a method as claimed in any one of claims I to 15.</p>
GB0611351A 2006-06-08 2006-06-08 Transient protection key derivation in a computing device Withdrawn GB2439568A (en)

Priority Applications (4)

Application Number Priority Date Filing Date Title
GB0611351A GB2439568A (en) 2006-06-08 2006-06-08 Transient protection key derivation in a computing device
US12/303,282 US20090327722A1 (en) 2006-06-08 2007-06-07 Transient Protection Key Derivation in a Computing Device
EP07733115A EP2030144A1 (en) 2006-06-08 2007-06-07 Transient protection key derivation in a computing device
PCT/GB2007/002104 WO2007141532A1 (en) 2006-06-08 2007-06-07 Transient protection key derivation in a computing device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
GB0611351A GB2439568A (en) 2006-06-08 2006-06-08 Transient protection key derivation in a computing device

Publications (2)

Publication Number Publication Date
GB0611351D0 GB0611351D0 (en) 2006-07-19
GB2439568A true GB2439568A (en) 2008-01-02

Family

ID=36745523

Family Applications (1)

Application Number Title Priority Date Filing Date
GB0611351A Withdrawn GB2439568A (en) 2006-06-08 2006-06-08 Transient protection key derivation in a computing device

Country Status (4)

Country Link
US (1) US20090327722A1 (en)
EP (1) EP2030144A1 (en)
GB (1) GB2439568A (en)
WO (1) WO2007141532A1 (en)

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8555059B2 (en) 2010-04-16 2013-10-08 Microsoft Corporation Secure local update of content management software
CN108965824B (en) * 2018-08-13 2020-06-19 晋商博创(北京)科技有限公司 Video monitoring method and system based on CPK, camera, server and client

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6052468A (en) * 1998-01-15 2000-04-18 Dew Engineering And Development Limited Method of securing a cryptographic key
EP1472589A1 (en) * 2002-02-07 2004-11-03 Activcard Ireland Limited Support for multiple login methods.
US20040255137A1 (en) * 2003-01-09 2004-12-16 Shuqian Ying Defending the name space

Family Cites Families (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP3583657B2 (en) * 1998-09-30 2004-11-04 株式会社東芝 Relay device and communication device
US6687823B1 (en) * 1999-05-05 2004-02-03 Sun Microsystems, Inc. Cryptographic authorization with prioritized and weighted authentication
US7391865B2 (en) * 1999-09-20 2008-06-24 Security First Corporation Secure data parser method and system
WO2003062969A1 (en) * 2002-01-24 2003-07-31 Activcard Ireland, Limited Flexible method of user authentication
SE0202451D0 (en) * 2002-08-15 2002-08-15 Ericsson Telefon Ab L M Flexible Sim-Based DRM agent and architecture
KR100694061B1 (en) * 2004-10-06 2007-03-12 삼성전자주식회사 Apparatus and Method for storing data securly

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6052468A (en) * 1998-01-15 2000-04-18 Dew Engineering And Development Limited Method of securing a cryptographic key
EP1472589A1 (en) * 2002-02-07 2004-11-03 Activcard Ireland Limited Support for multiple login methods.
US20040255137A1 (en) * 2003-01-09 2004-12-16 Shuqian Ying Defending the name space

Also Published As

Publication number Publication date
US20090327722A1 (en) 2009-12-31
EP2030144A1 (en) 2009-03-04
WO2007141532A1 (en) 2007-12-13
GB0611351D0 (en) 2006-07-19

Similar Documents

Publication Publication Date Title
US20170070495A1 (en) Method to secure file origination, access and updates
Prabakaran et al. Multi-factor authentication for secured financial transactions in cloud environment
US10250589B2 (en) System and method for protecting access to authentication systems
WO2008109661A2 (en) Method and system for securely caching authentication elements
Papaspirou et al. A novel two-factor honeytoken authentication mechanism
Pagar et al. Strengthening password security through honeyword and Honeyencryption technique
Mohammed et al. Current multi-factor of authentication: Approaches, requirements, attacks and challenges
Boonkrong et al. Multi-factor authentication
Wang et al. A new fingerprint authentication scheme based on secret-splitting for enhanced cloud security
Gupta et al. Implementing high grade security in cloud application using multifactor authentication and cryptography
US20090327722A1 (en) Transient Protection Key Derivation in a Computing Device
Park et al. Privacy preserving biometric-based user authentication protocol using smart cards
Waheed et al. Secure login protocols: An analysis on modern attacks and solutions
Lee et al. Improvement of Li-Hwang's biometrics-based remote user authentication scheme using smart cards
Krishna et al. Bank Application: One-Time Password Generation
Singh et al. Relevance of Multifactor Authentication for Secure Cloud Access
Sudha et al. A survey on different authentication schemes in cloud computing environment
Revathy A review based on secure banking application against server attacks
WO2016042473A1 (en) Secure authentication using dynamic passcode
Hari et al. Enhancing security of one time passwords in online banking systems
LONE et al. User Authentication Mechanism for Access Control Management: A Comprehensive Study
Xu et al. OTP bidirectional authentication scheme based on MAC address
Landyshev et al. The practice of using one-time passwords in modern corporate information systems
Amein Hidden risks of consumer-grade biometrics
Jayapandiyan et al. Multi-Layered Information Security (MLIS) System for E-Commerce Application Authentication and Application Access

Legal Events

Date Code Title Description
732E Amendments to the register in respect of changes of name or changes affecting rights (sect. 32/1977)

Free format text: REGISTERED BETWEEN 20090219 AND 20090225

WAP Application withdrawn, taken to be withdrawn or refused ** after publication under section 16(1)